CVE-2010-0305

ejabberd_c2s.erl in ejabberd before 2.1.3 allows remote attackers to cause a denial of service (daemon crash) via a large number of c2s (aka client2server) messages that trigger a queue overload.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:process-one:ejabberd:*:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:0.9:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:0.9.8:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:1.1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:1.1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:1.1.14:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:2.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:2.0.1_2:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:process-one:ejabberd:2.1.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:11

Type Values Removed Values Added
References () http://secunia.com/advisories/38337 - Vendor Advisory () http://secunia.com/advisories/38337 - Vendor Advisory
References () http://secunia.com/advisories/39423 - () http://secunia.com/advisories/39423 -
References () http://www.debian.org/security/2010/dsa-2033 - () http://www.debian.org/security/2010/dsa-2033 -
References () http://www.openwall.com/lists/oss-security/2010/01/29/1 - Patch () http://www.openwall.com/lists/oss-security/2010/01/29/1 - Patch
References () http://www.openwall.com/lists/oss-security/2010/01/29/5 - Patch () http://www.openwall.com/lists/oss-security/2010/01/29/5 - Patch
References () http://www.osvdb.org/62066 - () http://www.osvdb.org/62066 -
References () http://www.securityfocus.com/bid/38003 - () http://www.securityfocus.com/bid/38003 -
References () http://www.vupen.com/english/advisories/2010/0894 - () http://www.vupen.com/english/advisories/2010/0894 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/56025 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/56025 -
References () https://support.process-one.net/browse/EJAB-1173 - () https://support.process-one.net/browse/EJAB-1173 -

Information

Published : 2010-02-03 19:30

Updated : 2024-11-21 01:11


NVD link : CVE-2010-0305

Mitre link : CVE-2010-0305

CVE.ORG link : CVE-2010-0305


JSON object : View

Products Affected

process-one

  • ejabberd
CWE
CWE-20

Improper Input Validation